The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
References
Link | Resource |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | Vendor Advisory |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 - Vendor Advisory |
Information
Published : 2021-09-29 22:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41034
Mitre link : CVE-2021-41034
CVE.ORG link : CVE-2021-41034
JSON object : View
Products Affected
eclipse
- che
CWE
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel